Secure Data Hiding in Encrypted Video Using SVD
P.S.S. Akilashri1 , M.Kannan 2
Section:Survey Paper, Product Type: Journal Paper
Volume-06 ,
Issue-11 , Page no. 251-255, Dec-2018
Online published on Dec 31, 2018
Copyright © P.S.S. Akilashri, M.Kannan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: P.S.S. Akilashri, M.Kannan, “Secure Data Hiding in Encrypted Video Using SVD,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.251-255, 2018.
MLA Style Citation: P.S.S. Akilashri, M.Kannan "Secure Data Hiding in Encrypted Video Using SVD." International Journal of Computer Sciences and Engineering 06.11 (2018): 251-255.
APA Style Citation: P.S.S. Akilashri, M.Kannan, (2018). Secure Data Hiding in Encrypted Video Using SVD. International Journal of Computer Sciences and Engineering, 06(11), 251-255.
BibTex Style Citation:
@article{Akilashri_2018,
author = {P.S.S. Akilashri, M.Kannan},
title = {Secure Data Hiding in Encrypted Video Using SVD},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {06},
Issue = {11},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {251-255},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=581},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=581
TI - Secure Data Hiding in Encrypted Video Using SVD
T2 - International Journal of Computer Sciences and Engineering
AU - P.S.S. Akilashri, M.Kannan
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 251-255
IS - 11
VL - 06
SN - 2347-2693
ER -
Abstract
Video data hiding is a very Abstract – Video data hiding is very important research topic. Security of information is major concern of information technology and communication. This paper introduces svd and Least Significant bit substitution technique for hiding data in video file. In this paper data hiding a form of cryptography embeds data into digital media for the purpose of identification, annotation. These algorithms are a basic algorithm of encryption and decryption for data hiding. The framework is tested by all kind of videos such as .mp4, .3gp, .avi etc., and gets successful output for all video data hiding process. The three components Red, Green, Blue of (RGB) space are utilized by this scheme to embed watermark into the cover image. Specifically the combinations of Singular Value Decomposition (SVD) of Blue channel are used to embed the data hiding. The singular values of wavelet subband coefficients of Blue channel are use in different scaling factors to embed the singular values of the data. The SVD increases the security, robustness and imperceptibility of the scheme. The proposed scheme used by security, while hiding the video to provide security for encrypts and decrypt process. The simulation results show that the process of hiding the video by security.
Key-Words / Index Term
Video Data hiding, Encryption, Decryption, Security Data, SVD
References
Noise models in digital image processing Ajay Kumar Boyat1 and Brijendra Kumar Joshi2-2, April 2015.
[2] A survey on security issues: digital images Srinivas Koppu1, madhuviswanatham-18-06-2016.
[3] A Survey on Separable Reversible Data Hiding in Encrypted Image Ganesh Gunjal- 7, July 2015.
[4] Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation J. W. Zhang-2014.
[5] A Survey on Data Hiding Techniques in Encrypted Images- Minu Lalitha Madhavu- 1, January 2016.
[6] Alexandre H. Paqueta, Rabab K. Ward, Ioannis Pitas, Wavelet packets-Based digital watermarking for image Verification and authentication. Signal Processing.2003.
[7] T. Amornraksa, K. Janthawongwilai. Enhanced images watermarking based on amplitude modulation. Journal Image and Vision Computing.2006.
[8] Haohao song_, songyu yu, xiaokang yang, li song, Chen wang. Contourlet-Based
[9] Han-Min Tsai, Long-WenChang. Secure reversible visible mage watermarking with authentication. J Signal Processing: Image Communication.2010.
[10] YounhoLee, Heeyoul Kim, Yongsu Park. A new data hiding scheme for binary image authentication with small image distortion.J Information Sciences.2009